The Voice of Cyber®

News & Thoughts

Stay up-to-date on the news with press releases from some of the biggest organisations and deep-dive articles from leaders within the industry.

Deep Dive Articles

Like It or Not, PQC Is the Key (For Now)

Like It or Not, PQC Is the Key (For Now)

Every few months, another “quantum-safe” technology is marketed as the real answer, usually with the claim that post-quantum cryptography isn’t enough. PQC is too new, too slow, too fragile, too unproven. One person I spoke to even described adopting PQC as “shuffling the furniture on a sinking ship,” as if the standards effort itself is the ...
The ABCs of GRC

The ABCs of GRC

Introduction In the face of increasing regulatory pressure, rising cyber threats, and growing business complexity, organisations need a structured, scalable approach to managing risk. Governance, Risk, and Compliance (GRC) frameworks have become vital for aligning information security with corporate objectives, ensuring operational resilience, and ...
The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

The Korean Leaks – Analysing the Hybrid Geopolitical Campaign Targeting South Korean Financial Services with Qilin RaaS

When preparing data for the Bitdefender Threat Debrief | October 2025, Bitdefender noticed a significant departure from established ransomware trends. Typically, the top five most impacted countries are consistently the US, Canada, and major Western European nations. However, for this period, South Korea (KR) suddenly became the second most-targeted ...
Post Qantas Breach What Happens Now

Post Qantas Breach What Happens Now

​Months after a breach hit Qantas Airways, the airline recently confirmed that stolen customer information has now been released publicly by cybercriminals. This is despite the airline’s legal efforts to prevent the stolen data from being accessed, shared, and published. Experts are now helping Qantas to establish what data has been leaked, but early ...
Oracle is All in on AI Everything

Oracle is All in on AI Everything

Oracle is keeping up with the AI moment, like the rest of Silicon Valley. The database company, as we know it, is aware they need to move down the AI path to keep relevant and to keep up with customer demands. Well, truth be told, Oracle is betting big and is going all in on defining AI. Oracle’s big bet on ‘AI Native Data’ is their newest release, as ...
How the Financial Sector Is Battling New Cyber Threats

How the Financial Sector Is Battling New Cyber Threats

Graph databases are already proving their worth across fraud detection, compliance, and AI enablement. Their promise, however, extends further to a future where financial institutions can act not just faster, but smarter.
Turning Hesitation into Action

Turning Hesitation into Action

Unpacking Cisco and Governance Institute’s AI Risk Report at Cisco Live! 2025
A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?

A Polycrisis of AI Cyberattacks is Approaching. Are You Breach Ready Yet?

Unless you have been living under a rock in the past few days, you would have seen that cybersecurity headlines have been overshadowed by reports that hackers fooled artificial intelligence agents into automating break-ins into major corporations. Anthropic, the makers of the artificial intelligence (AI) chatbot Claude, claim to run an investigation ...
No results found.

In The News

Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

Fake Leonardo DiCaprio Movie Torrent Spreads Agent Tesla Trojan Through Layered PowerShell Chain

After noticing a spike in detections involving what looked like a movie torrent for One Battle After Another, Bitdefender researchers started an investigation and discovered that it was a complex infection chain. The film, Leonardo DiCaprio's latest, has quickly gained notoriety, making it an attractive lure for cybercriminals seeking to infect as ...
Tenable Patch Tuesday commentary – December 2025

Tenable Patch Tuesday commentary – December 2025

In the last Patch Tuesday for 2025, Microsoft addresses 56 CVEs, including two publicly disclosed vulnerabilities and one zero-day that was exploited in the wild. Elevation of privilege (EoP) vulnerabilities accounted for 50% of the vulnerabilities patched this month, followed by remote code execution (RCE) vulnerabilities at 33.9%. Please find below a ...
CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Research: Security Flaws in DeepSeek-Generated Code Linked to Political Triggers

CrowdStrike Counter Adversary Operations identifies innocuous trigger words that lead DeepSeek to produce more vulnerable code.
BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

BeyondTrust and Ping Identity Partner to Deliver Unified Identity Security Fabric

Combined solution automates identity decisions across human and non-human identities, strengthening Zero Trust security | Joint offering eliminates identity silos by integrating PAM, IAM, and IGA into a cohesive, AI-driven framework for enhanced visibility, control and governance
Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell Selected by Fitzroy River Water to Advance Digital Transformation and Automation of Rockhampton’s Water Infrastructure

Honeywell (NASDAQ: HON) has been selected by Fitzroy River Water, part of Rockhampton Regional Council, to modernise and automate key water treatment facilities, as part of the Council’s long-term infrastructure improvement program. Rockhampton, located in Central Queensland, relies on Fitzroy River Water to deliver essential water and sewerage ...
Genetec Releases 2026 Global State of Physical Security Report

Genetec Releases 2026 Global State of Physical Security Report

Survey of more than 7,300 professionals reveals: Physical security has evolved into a strategic business function, strengthening IT collaboration and decision-making | Interest in adopting AI more than doubled among end users since last year | Organisations want flexibility to deploy workloads on premises, in the cloud, or in a hybrid model
NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne Expands Automated Endpoint Management Platform with Native Remote Access

NinjaOne recently announced NinjaOne Remote®, a remote access solution natively integrated into the NinjaOne Platform. NinjaOne Remote was built from the ground up for businesses, not consumers, with security in mind, and gives IT teams and MSPs fast, reliable, and secure control over endpoints, wherever they are. The solution is built on a ...
Australia Leads the World in Organisational Concern over Identity Driven Attacks

Australia Leads the World in Organisational Concern over Identity Driven Attacks

Rubrik Zero Labs Issues Latest Study “Identity Crisis: Understanding & Building Resilience Against Identity-Driven Threats”
No results found.

What We Do

KBI.Media is The Voice of Cyber.

We broadcast some of the most important and informative cyber content from some of the largest organisations, governments, and promising start-ups from around the world.
We're also responsible for creating a lot of it..

Share This